Skip to main content

USTA Threat Stream IOC Feed

This Integration is part of the USTA Cyber Threat Intelligence Platform Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.10.0 and later.

This integration fetches indicators from the USTA Threat Stream feed. The indicators can be of type malicious URLs or malware hashes. This integration was integrated and tested with version 4.1.0 of FeedUstaThreatStream.

Configure USTA Threat Stream IOC Feed on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for USTA Threat Stream IOC Feed.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Fetch indicatorsFalse
    Server's URLTrue
    API KeyThe API Key to use for connectionTrue
    IOC Feed TypeTrue
    Indicator ReputationIndicators from this integration instance will be marked with this reputationFalse
    Source ReliabilityReliability of the source providing the intelligence dataTrue
    Traffic Light Protocol ColorThe Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feedFalse
    Feed Fetch IntervalFalse
    Bypass exclusion listWhen selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system.False
    Trust any certificate (not secure)False
    Use system proxy settingsFalse
    False
    False
    TagsSupports CSV values.False
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

usta-tsa-search-malware-hash#


Search malware hash indicators from the feed.

Base Command#

usta-tsa-search-malware-hash

Input#

Argument NameDescriptionRequired
limitThe maximum number of results to return. Default is 10.Optional
hashThe hash to search for. It can be a SHA-1, SHA-256, or MD5 hash.Required

Context Output#

PathTypeDescription
USTA.ThreatStreamMalwareHashes.idStringThe ID of the alert
USTA.ThreatStreamMalwareHashes.hashes[0].sha256StringThe SHA-256 hash of the malware
USTA.ThreatStreamMalwareHashes.hashes[0].md5StringThe MD5 hash of the malware
USTA.ThreatStreamMalwareHashes.hashes[0].sha1StringThe SHA-1 hash of the malware
USTA.ThreatStreamMalwareHashes.tagsArrayThe tags of the malware
USTA.ThreatStreamMalwareHashes.createdDateThe creation date of the malware
USTA.ThreatStreamMalwareHashes.valid_fromDateThe valid from date of the malware
USTA.ThreatStreamMalwareHashes.valid_untilDateThe valid until date of the malware

Command Example#

!usta-tsa-search-malware-hash hash=d5d8c33957e90d1caca4b5207d8da5ab1bc4caa9f702abc0ec006d0518ea9aec

Context Example#

{
"USTA" :{
"ThreatStreamMalwareHashes":[
{
"id": "bf89614f-0ec8-4a88-a4e7-085b113a871b",
"hashes": {
"sha256": "d5d8c33957e90d1caca4b5207d8da5ab1bc4caa9f702abc0ec006d0518ea9aec",
"sha1": "659661291eb5fd6452d6cabdc24cd9fbc1fb17f7",
"md5": "4a15ed0feb9e90b56e82c2e45a3b3f5e"
},
"tags": [
"SnakeKeylogger"
],
"valid_from": "2024-11-22T07:30:07.000Z",
"valid_until": "2025-11-22T07:30:07.000Z",
"created": "2024-11-22T07:37:40.729Z"
}
]
}
}

usta-tsa-search-malicious-url#


Search malicious URL indicators from the feed.

Base Command#

usta-tsa-search-malicious-url

Input#

Argument NameDescriptionRequired
limitThe maximum number of results to return. Default is 10.Optional
urlThe URL to search for.Required

Context Output#

PathTypeDescription
USTA.ThreatStreamMaliciousUrls.idStringThe ID of the alert
USTA.ThreatStreamMaliciousUrls.urlStringThe URL of the malicious site
USTA.ThreatStreamMaliciousUrls.is_domainBooleanWhether the malicious site is a domain
USTA.ThreatStreamMaliciousUrls.ip_addressesArrayThe IP addresses of the malicious site
USTA.ThreatStreamMaliciousUrls.tagsArrayThe tags of the malicious site
USTA.ThreatStreamMaliciousUrls.createdDateThe creation date of the malicious site
USTA.ThreatStreamMaliciousUrls.valid_fromDateThe valid from date of the malicious site
USTA.ThreatStreamMaliciousUrls.valid_untilDateThe valid until date of the malicious site

Command Example#

!usta-tsa-search-malicious-url url=http://192.168.100.1:38082/i

Context Example#

{
"USTA" :{
"ThreatStreamMaliciousUrls":[
{
"id": "28cffb9a-add5-480c-8968-539863695770",
"url": "http://192.168.100.1:38082/i",
"host": "192.168.100.1",
"is_domain": false,
"ip_addresses": [
"192.168.100.1"
],
"tags": [
"elf.mozi"
],
"valid_from": "2024-11-22T07:24:06.000Z",
"valid_until": "2025-11-22T07:24:06.000Z",
"created": "2024-11-22T08:30:03.055Z"
}
]
}
}

usta-tsa-search-phishing-site#


Search malicious URL indicators from the feed.

Base Command#

usta-tsa-search-phishing-site

Input#

Argument NameDescriptionRequired
limitThe maximum number of results to return. Default is 10.Optional
urlThe URL to search for.Required

Context Output#

PathTypeDescription
USTA.ThreatStreamPhishingSites.idStringThe ID of the alert
USTA.ThreatStreamPhishingSites.urlStringThe URL of the phishing site
USTA.ThreatStreamPhishingSites.is_domainBooleanWhether the phishing site is a domain
USTA.ThreatStreamPhishingSites.ip_addressesArrayThe IP addresses of the phishing site
USTA.ThreatStreamPhishingSites.createdDateThe creation date of the phishing site

Command Example#

!usta-tsa-search-phishing-site url=example.com

Context Example#

{
"USTA" :{
"ThreatStreamMaliciousUrls":[
{
"id": 219286,
"url": "https://example.com",
"host": "example.com",
"is_domain": true,
"ip_addresses": [
"192.168.100.1"
],
"country": null,
"created": "2024-02-05T15:23:11.646011Z"
}
]
}
}